Vulnerable Cyberattack Targets

My initial research idea is slightly different from my current research idea. I first wanted to research cyberwarfare, automation, or how people will prevent hackers from utilizing advanced technology to breach a network. I changed my focus because of my employer post. An interesting fact was that CTG Tech, one of my employers, mentioned over 50% of cyber attacks on their website targeted small to medium-sized businesses (CTG Tech, 2021). Researching why these companies are susceptible to cyber-attacks has drawn my attention as I read more information. Now my main research topic is why local companies are vulnerable to cyber-attacks? If this main question does not pan out, my backup question would be: What do hackers gain from breaching networks? This question would investigate how hackers breach a network, what they do with valuable information, and how some of them do not get traced. I think the second question would provide a perspective through the lens of a hacker and what they see in a network that makes it breachable. 

Fidsor / Pixabay

The primary databases I will use to investigate the questions I impose in the Forsyth Library are Computer Source, Computer Science Collection, and Information Science Collection. 

The Computer Source database description states that the journal articles are relevant to updated information about high technology trends. I would assume that I could find reports about cyberattacks because it is a popular trend in technology. Another topic that may produce more articles about cyberattacks is Russia creating a cyberwar against the United States for imposing sanctions on their banks. This event could make people develop more reports on how businesses should protect their systems and the measures they need to ensure protection.

The Computer Science Collection database entails information about software and electronics that could contribute to my research. I could search for the types of software that small to medium-sized businesses use to protect their network. I also could search for articles reporting hacked companies and find out the common problem they have for breaches. If I use my second question for my research, I may be able to find information on the type of software people use to breach companies’ networks to gain a hacker’s perspective.

Finally, the Information Science Collection database would be valuable because the description mentions that there are articles on data processing techniques and information infrastructure. Since I have a basic knowledge of networking models, I can review articles related to businesses’ processing measures to protect their systems. This database could also have reports of an employee in a company who was not aware of cyberattacks and was taken advantage of by imposing as a threat actor. As I have mentioned in my article review post, it takes one person to compromise a company’s system by not being aware of cyberattacks. 

References:

CTG Tech. (2021, September 23). Network & Cyber Security Services | Threat Detection |                           Email Encryption. CTG Tech | Managed IT Services Provider DFW & Amarillo TX.                           https://www.ctgmanagedit.com/services/network-security-services/

About Peyton Rohan

I graduated from Eastland High School in the year 2020. Throughout High School, I have always been on the A honor roll. Throughout High School, I played a variety of sports such as basketball, football, golf, and track. My greatest interest was watching and playing basketball. I started my attendances at Fort Hays State University during the fall of 2020 and have been on the Dean's Honor Roll for the past two semesters. I now plan on graduating from Fort Hays State University during the year 2023 with a Bachelor of Computer Networking and Telecommunications degree that mainly focuses on Cybersecurity. I would say throughout the years of my education is that I am a persistent and hard worker, who gets assignments and projects done.

2 thoughts on “Vulnerable Cyberattack Targets

  1. Hey Peyton,

    You have a very interesting topic to talk about. In fact it kind of has peeked my interest into it. however I will have to explore at another time when I have free time. The main research point should provide a decent amount of information for you to use. I know from my knowledge that small business are easy to target since they do not have a big As for your chosen databases I would of chosen the same. they offer great amount of articles that can help you research the topic at hand.

  2. Hi Peyton,
    I really like your research question and it looks like you are very well organized and have everything planned out. I have not done any research, but my thought about why local businesses are more vulnerable to cyber attacks is I think hackers thought process is since it is probably a smaller business they most likely have less security than bigger companies. I could be completely wrong, but that is just my guess so we will see what you find out. Other than that I think your databases are good and I think you are completely on the right track! Good luck

Leave a Reply to Justin Korbe Cancel reply

Your email address will not be published. Required fields are marked *